Sciweavers

135 search results - page 4 / 27
» Attacks on the RC4 stream cipher
Sort
View
FSE
2006
Springer
94views Cryptology» more  FSE 2006»
13 years 10 months ago
Resynchronization Attacks on WG and LEX
WG and LEX are two stream ciphers submitted to eStream
Hongjun Wu, Bart Preneel
FSE
2003
Springer
95views Cryptology» more  FSE 2003»
13 years 11 months ago
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive
Abstract. Helix is a high-speed stream cipher with a built-in MAC functionality. On a Pentium II CPU it is about twice as fast as Rijndael or Twofish, and comparable in speed to R...
Niels Ferguson, Doug Whiting, Bruce Schneier, John...
TODAES
2011
107views more  TODAES 2011»
13 years 1 months ago
Scan-based attacks on linear feedback shift register based stream ciphers
—In this paper, we present an attack on stream cipher implementations by determining the scan chain structure of the linear feedback shift registers in their implementations. Alt...
Yu Liu, Kaijie Wu, Ramesh Karri
IEEEIAS
2009
IEEE
14 years 27 days ago
Guess and Determine Attack on SOSEMANUK
SOSEMANUK is a word-oriented stream cipher submitted to the ECRYPT stream cipher project, with a variable-length key between 128 and 256 bits. The algorithm is similar to the strea...
Ding Lin, Guan Jie
ICISC
2004
120views Cryptology» more  ICISC 2004»
13 years 7 months ago
Algebraic Attacks on Combiners with Memory and Several Outputs
Algebraic attacks on stream ciphers [14] recover the key by solving an overdefined system of multivariate equations. Such attacks can break several interesting cases of LFSR-based ...
Nicolas Courtois